International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

1 2 3 4 5 [ 6 ] 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116
2015-10-30
21:17 [Pub][ePrint]The Complexity of Computing the Optimal Composition of Differential Privacy, by Jack Murtagh, Salil Vadhan[ expand ]
21:17 [Pub][ePrint]Information-theoretic Local Non-malleable Codes and their Applications, by Nishanth Chandran; Bhavana Kanukurthi; Srinivasan Raghuraman[ expand ]
21:17 [Pub][ePrint]Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits, by Yuval Ishai; Mor Weiss; Guang Yang[ expand ]
21:17 [Pub][ePrint]Computational Soundness of Uniformity Properties for Multi-party Computation based on LSSS, by HUI ZHAO and Kouichi Sakurai[ expand ]
21:17 [Pub][ePrint]Oblivious Parallel RAM: Improved Efficiency and Generic Constructions, by Binyi Chen; Huijia Lin; Stefano Tessaro[ expand ]
21:17 [Pub][ePrint]PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management, by Chenglu Jin and Xiaolin Xu and Wayne Burleson and Ulrich Rührmair and Marten van Dijk[ expand ]
21:17 [Pub][ePrint]Cryptanalysis and Improvement of Identity-based Proxy Multi-signature scheme, by Jayaprakash Kar[ expand ]
21:17 [Pub][ePrint]Comparison Between Irreducible and Separable Goppa Code in McEliece Cryptosystem, by Thuraya M. Qaradaghi and Newroz N. Abdulrazaq[ expand ]
05:44 [Event][New]IoTPTS 2016: 2nd ACM International Workshop on IoT Privacy, Trust, and Security[ expand ]
00:17 [Pub][ePrint]Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers, by Thomas Peyrin and Yannick Seurin[ expand ]
00:17 [Pub][ePrint]Verifiable Random Functions from Standard Assumptions, by Dennis Hofheinz; Tibor Jager[ expand ]
00:17 [Pub][ePrint]Reconfigurable Cryptography: A flexible approach to long-term security, by Julia Hesse and Dennis Hofheinz and Andy Rupp[ expand ]
00:17 [Pub][ePrint]From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back, by Benny Applebaum; Pavel Raykov[ expand ]
00:17 [Pub][ePrint]Exploiting Transformations of the Galois Configuration to Improve Guess-and-Determine Attacks on NFSRs, by Gefei Li and Yuval Yarom and Damith C. Ranasinghe[ expand ]


2015-10-29
15:39 [Job][New]Faculty Position (Professur, W3) for Computer Science with focus on IT-Security, CISPA, Saarland University, Germany[ expand ]
15:39 [Job][New]Post-Doc in Cryptography/E-Voting, University of Trier, Germany[ expand ]
15:37 [Job][New]Faculty Position (Professur, W2) for Computer Science with focus on IT-Security, CISPA, Saarland University, Germany[ expand ]


2015-10-28
21:17 [Pub][ePrint]Homomorphic evaluation requires depth, by Andrej Bogdanov; Chin Ho Lee[ expand ]
21:17 [Pub][ePrint]The Index j in RC4 is not Pseudo-random due to Non-existence of Finney Cycle, by Subhamoy Maitra[ expand ]
21:17 [Pub][ePrint]ARMed SPHINCS -- Computing a 41KB signature in 16KB of RAM, by Andreas Hülsing and Joost Rijneveld and Peter Schwabe[ expand ]
21:17 [Pub][ePrint]The Number of Boolean Functions with Multiplicative Complexity 2, by Magnus Gausdal Find and Daniel Smith-Tone and Meltem Sonmez Turan[ expand ]
21:17 [Pub][ePrint]Fully Homomorphic Encryption with Composite Number Modulus, by Masahiro Yagisawa[ expand ]
21:17 [Pub][ePrint]Maturity and Performance of Programmable Secure Computation, by David W. Archer and Dan Bogdanov and Benny Pinkas and Pille Pullonen[ expand ]
03:17 [Pub][ePrint]Revisiting LEGOs: Optimizations, Analysis, and their Limit, by Yan Huang and Ruiyu Zhu[ expand ]
03:17 [Pub][ePrint]Cryptanalysis of GGH15 Multilinear Maps, by Jean-Sebastien Coron[ expand ]
03:17 [Pub][ePrint]Patterson-Wiedemann Type Functions on 21 Variables, by Selcuk Kavut and Subhamoy Maitra[ expand ]
03:17 [Pub][ePrint]CARIBE: Adapting Traditional IBE for the Modern Key-Covetous Appetite, by Britta Hale and Christopher Carr and Danilo Gligoroski[ expand ]


2015-10-27
15:17 [Pub][ePrint]Real time detection of cache-based side-channel attacks using Hardware Performance Counters, by Marco Chiappetta and Erkay Savas and Cemal Yilmaz[ expand ]
15:17 [Pub][ePrint]The Ultimate Transposition Cipher (UTC), by Gideon Samid[ expand ]


2015-10-26
21:17 [Pub][ePrint]Essentially Optimal Robust Secret Sharing with Maximal Corruptions, by Allison Bishop and Valerio Pastro and Rajmohan Rajaraman and Daniel Wichs[ expand ]
21:17 [Pub][ePrint]Secure Dating with Four or Fewer Cards, by Antonio Marcedone and Zikai Wen and Elaine Shi[ expand ]
21:17 [Pub][ePrint]SECOND COORDINATE SEQUENCE OF MP-LRS OVER NONTRIVIAL GALOIS RING OF ODD CHARACTERISTIC, by Vadim N.Tsypyschev[ expand ]
18:17 [Pub][ePrint]The Energy Budget for Wireless Security: Extended Version, by Dave Singel\\\'ee and Stefaan Seys and Lejla Batina and Ingrid Verbauwhede[ expand ]
18:17 [Pub][ePrint]Reviving the Idea of Incremental Cryptography for the Zettabyte era Use case: Incremental Hash Functions Based on SHA-3, by Hristina Mihajloska and Danilo Gligoroski and Simona Samardjiska[ expand ]
18:17 [Pub][ePrint]Extended Tower Number Field Sieve: A New Complexity for Medium Prime Case, by Taechan Kim[ expand ]
18:17 [Pub][ePrint]Hardness Estimation of LWE via Band Pruning, by Yoshinori Aono and Le Trieu Phong and Lihua Wang[ expand ]
18:17 [Pub][ePrint]PAGES+,PAGES-, and PAGES-- - Three Families of Block Ciphers, by Dieter Schmidt[ expand ]



2015-10-23
14:20 [Job][New]PhD position, Graz University of Technology[ expand ]
06:17 [Pub][ePrint]Parallel Implementation of Number Theoretic Transform, by Hwajeong Seo and Zhe Liu and Yasuyuki Nogami and Jongseok Choi and Taehwan Park and Howon Kim[ expand ]
06:17 [Pub][ePrint]Indistinguishability Obfuscation with Constant Size Overhead, by Prabhanjan Ananth and Abhishek Jain and Amit Sahai[ expand ]
06:17 [Pub][ePrint]Recent progress on the elliptic curve discrete logarithm problem, by Steven D. Galbraith and Pierrick Gaudry[ expand ]
06:17 [Pub][ePrint]New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption and Their Application, by Katsuyuki Takashima[ expand ]
06:17 [Pub][ePrint]Attacking the Network Time Protocol, by Aanchal Malhotra and Isaac E. Cohen and Erik Brakke and Sharon Goldberg[ expand ]
06:17 [Pub][ePrint]Speed-Security Tradeoffs in Blockchain Protocols, by Aggelos Kiayias and Giorgos Panagiotakos[ expand ]


2015-10-21
09:10 [Job][New]Assistant Research Scientist: Engineering Cybersecurity, University of Michigan Transportation Institute, Ann Arbor, USA[ expand ]
09:09 [Event][New]CS2-2016: Third Workshop on Cryptography and Security in Computing Systems[ expand ]
03:17 [Pub][ePrint]A Riddle Wrapped in an Enigma, by N. Koblitz and A. Menezes[ expand ]
03:17 [Pub][ePrint]Functional Encryption: Decentralised and Delegatable, by Nishanth Chandran and Vipul Goyal and Aayush Jain and Amit Sahai[ expand ]
03:17 [Pub][ePrint]Lifting the Security of NI-MAC Beyond Birthday Bound, by Avijit Dutta and Goutam Paul[ expand ]


2015-10-20
13:51 [Job][New]Doctoral student, Aalto University, Finland[ expand ]
08:53 [Event][New]SAC 2018: Conference on Selected Areas in Cryptography[ expand ]
08:52 [Event][New]SAC 2017: Conference on Selected Areas in Cryptography[ expand ]


2015-10-19
21:17 [Pub][ePrint]On Bitcoin as a public randomness source, by Joseph Bonneau and Jeremy Clark and Steven Goldfeder[ expand ]
21:17 [Pub][ePrint]Fast Fourier Orthogonalization, by Léo Ducas and Thomas Prest[ expand ]
21:17 [Pub][ePrint]Inception Makes Non-malleable Codes Stronger, by Divesh Aggarwal and Tomasz Kazana and Maciej Obremski[ expand ]
21:17 [Pub][ePrint]An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks, by Harish Karthikeyan and Suvradip Chakraborty and Kunwar Singh and C. Pandu Rangan[ expand ]
21:17 [Pub][ePrint]Hierarchical Functional Encryption, by Zvika Brakerski and Gil Segev[ expand ]
21:17 [Pub][ePrint]TWORAM: Round-Optimal Oblivious RAM with Applications to Searchable Encryption, by Sanjam Garg and Payman Mohassel and Charalampos Papamanthou[ expand ]
21:17 [Pub][ePrint]Applications of Key Recovery Cube-attack-like, by Pawel Morawiecki and Josef Pieprzyk and Michal Straus and Marian Srebrny[ expand ]
18:17 [Pub][ePrint]Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges, by Gaby G. Dagher and Benedikt Buenz and Joseph Bonneau and Jeremy Clark and Dan Boneh[ expand ]
15:42 [Job][New]PhD Internship, Microsoft Research, Redmond, Washington[ expand ]



2015-10-18
14:39 [Job][New]13 PhD Studentships, MSCA Privacy&Us ITN[ expand ]


2015-10-17
14:28 [Job][New]Embedded Cryptography Engineer, Kiwi Ki GmbH, Berlin, Germany[ expand ]


2015-10-16
18:17 [Pub][ePrint]How to Vote Privately Using Bitcoin, by Zhichao Zhao and T-H. Hubert Chan[ expand ]
18:17 [Pub][ePrint]Confidential Benchmarking based on Multiparty Computation, by Ivan Damgård and Kasper Damgård and Kurt Nielsen and Peter Sebastian Nordholt and Tomas Toft[ expand ]
18:17 [Pub][ePrint]Cryptanalysis of Yasuda, Takagi and Sakurai\'s Signature Scheme Using Invariant Subspaces, by Wenbin Zhang and Chik How Tan[ expand ]
18:17 [Pub][ePrint]Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices, by Shinya Okumura and Shingo Sugiyama and Masaya Yasuda and Tsuyoshi Takagi[ expand ]
18:17 [Pub][ePrint]Results on polynomial interpolation with mixed modular operations and unknown moduli, by Oscar Garcia-Morchon and Ronald Rietman and Igor Shparlinski and Ludo Tolhuizen[ expand ]


2015-10-15
21:17 [Pub][ePrint]got HW crypto? On the (in)security of a Self-Encrypting Drive series, by Gunnar Alendal and Christian Kison and modg[ expand ]
21:17 [Pub][ePrint]Dismantling real-world ECC \\\\ with Horizontal and Vertical Template Attacks, by Margaux Dugardin and Louiza Papachristodoulou and Zakaria Najm and Lejla Batina and Jean-Luc Danger and Sylvain Guille[ expand ]
21:17 [Pub][ePrint]Factoring as a Service, by Luke Valenta and Shaanan Cohney and Alex Liao and Joshua Fried and Satya Bodduluri and Nadia Heninger[ expand ]



2015-10-14
18:17 [Pub][ePrint]Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption, by Robert Granger and Philipp Jovanovic and Bart Mennink and Samuel Neves[ expand ]
18:17 [Pub][ePrint]All or Nothing at All, by Paolo D\'Arco and Navid Nasr Esfahan and Douglas R. Stinson[ expand ]
18:17 [Pub][ePrint]Incremental Program Obfuscation, by Sanjam Garg and Omkant Pandey[ expand ]
18:17 [Pub][ePrint]Multi-user Schnorr security, revisited, by Daniel J. Bernstein[ expand ]
18:17 [Pub][ePrint]Updates on Sorting of Fully Homomorphic Encrypted Data, by Nitesh Emmadi and Praveen Gauravaram and Harika Narumanchi and Habeeb Syed[ expand ]


2015-10-13
21:17 [Pub][ePrint]An Efficient Scheme to Reduce Side-Channel Leakage of MAC-Keccak for Smart Card, by Pei Luo and Liwei Zhang and Yunsi Fei and A. Adam Ding[ expand ]
21:17 [Pub][ePrint]Bi-Deniable Inner Product Encryption from LWE, by Daniel Apon and Xiong Fan and Feng-Hao Liu[ expand ]
21:17 [Pub][ePrint]Multilinear Map via Scale-Invariant FHE: Enhancing Security and Efficiency, by Jinsu Kim and Sungwook Kim and Jae Hong Seo[ expand ]
21:17 [Pub][ePrint]Ed3363 (HighFive) -- An alternative Elliptic Curve, by Mike Scott[ expand ]
21:17 [Pub][ePrint]Encryption Switching Protocols, by Geoffroy Couteau, Thomas Peters, David Pointcheval[ expand ]
21:17 [Pub][ePrint]Fast Oblivious AES\\\\A decicated application of the MiniMac protocol, by Ivan Damgård and Rasmus Winther Zakarias[ expand ]
21:17 [Pub][ePrint]Improved Linear Cryptanalysis of reduced-round SIMON-32 and SIMON-48, by Mohamed Ahmed Abdelraheem and Javad Alizadeh and Hoda A. Alkhzaimi and Mohammad Reza Aref and Nasour Bagheri and Praveen Gaurav[ expand ]
21:17 [Forum][IACR Publication Reform] 2014/879 by v_rudskoy[ expand ]
14:56 [Event][New]CXQS16: 1st CROSSING Winter School on Quantum Security[ expand ]
11:49 [Job][New]Ph.D. student in Crypto-Finance, Cybersecurity and Privacy, University of Luxembourg, Cryptolux team[ expand ]
06:17 [Pub][ePrint]Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries, by Yehuda Lindell and Ben Riva[ expand ]
00:17 [Pub][ePrint]Bit Coincidence Mining Algorithm, by Koh-ichi Nagao[ expand ]
00:17 [Pub][ePrint]Polynomial time reduction from 3SAT to solving low first fall degree multivariable cubic equations system, by Koh-ichi Nagao[ expand ]
00:17 [Pub][ePrint]Complexity of ECDLP under the First Fall Degree Assumption, by Koh-ichi Nagao[ expand ]
00:17 [Pub][ePrint]Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes, by Ping Ngai Chung and Craig Costello and Benjamin Smith[ expand ]
00:17 [Pub][ePrint]A note on constructions of bent functions from involutions, by Sihem Mesnager[ expand ]


2015-10-12
21:17 [Pub][ePrint]Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud, by Ayantika Chatterjee and Indranil Sengupta[ expand ]
21:17 [Pub][ePrint]Analysis of an RFID Authentication Protocol in Accordance with EPC Standards, by Behzad Abdolmaleki, Hamidreza Bakhshi, Karim Baghery, Mohammad Reza Aref[ expand ]
21:17 [Pub][ePrint]Guidelines for Using the CryptDB Systems Securely, by Raluca Ada Popa and Nickolai Zeldovich and Hari Balakrishnan[ expand ]
21:17 [Pub][ePrint]The OPTLS Protocol and TLS 1.3, by Hugo Krawczyk and Hoeteck Wee[ expand ]
21:17 [Pub][ePrint]Faster point scalar multiplication on NIST elliptic curves over GF(p) using (twisted) Edwards curves over GF(p³), by Michał Wroński[ expand ]
21:17 [Pub][ePrint]On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure, by Alex Biryukov and Léo Perrin[ expand ]
21:17 [Pub][ePrint]Extended Functionality in Verifiable Searchable Encryption, by James Alderman and Christian Janson and Keith M. Martin and Sarah Louise Renwick[ expand ]


2015-10-11
03:17 [Pub][ePrint]The Conjoined Microprocessor, by Ehsan Aerabi and A. Elhadi Amirouche and Houda Ferradi and R\\\'emi G\\\'eraud David Naccache and Jean Vuillemin[ expand ]



2015-10-09
21:17 [Pub][ePrint]Multilinear Maps over the Integers Using Modulus Switching, by Gu Chunsheng[ expand ]
21:17 [Pub][ePrint]Zero-Knowledge Interactive Proof Systems for New Lattice Problems, by Claude Crepéau and Raza Ali Kazmi[ expand ]
21:17 [Pub][ePrint]Differential and Linear Cryptanalysis of ARX with Partitioning -- Application to FEAL and Chaskey, by Gaëtan Leurent[ expand ]
21:17 [Pub][ePrint]Freestart collision on full SHA-1, by Marc Stevens and Pierre Karpman and Thomas Peyrin[ expand ]
21:17 [Pub][ePrint]Vulnerabilities of ``McEliece in the World of Escher\", by Dustin Moody and Ray Perlner[ expand ]
21:17 [Pub][ePrint]Some Cryptanalytic Results on Zipper Hash and Concatenated Hash, by Ashwin Jha and Mridul Nandi[ expand ]
21:17 [Pub][ePrint]Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash, by David Pointcheval and Olivier Sanders and Jacques Traoré[ expand ]
21:17 [Pub][ePrint]Attacks on Search RLWE, by Hao Chen, Kristin Lauter, and Katherine E. Stange[ expand ]


2015-10-08
21:17 [Pub][ePrint]Private Genome Analysis through Homomorphic Encryption, by Miran Kim and Kristin Lauter[ expand ]
21:17 [Pub][ePrint]Improved Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN, by Danping Shi and Lei Hu and Siwei Sun and Ling Song[ expand ]
09:46 [Job][New]Ph.D. student, CryptoExperts, Paris, France[ expand ]


2015-10-07
18:04 [Job][New]Postdoc on Multilinear Maps , Royal Holloway, University of London, UK[ expand ]
01:30 [Job][New]Post-doctoral researcher in Cryptography, Chalmers University of Technology, Sweden [ expand ]
01:28 [Job][New]tenure-track Professor (open rank), Worcester Polytechnic Institute, Worcester, Massachusetts, USA[ expand ]
01:26 [Job][New]Senior Research Associate: Dynamic Policies for Cyber-Physical Infrastructures under Attack, Lancaster University, UK (Security Lancaster Research Centre)[ expand ]


2015-10-06
15:17 [Pub][ePrint]When Organized Crime Applies Academic Results - A Forensic Analysis of an In-Card Listening Device, by Houda Ferradi and R\\\'emi G\\\'eraud and David Naccache and Assia Tria[ expand ]
15:17 [Pub][ePrint]SOME REMARKS ON THE LOGARITHMIC SIGNATURES OF FINITE ABELIAN GROUPS, by Thuong T. Dang, Tri T. Ton, Van H. Dang, Thuc D. Nguyen[ expand ]
01:17 [Event][New]SAC 2016: Conference on Selected Areas in Cryptography[ expand ]



2015-10-05
18:17 [Pub][ePrint]Short Structure-Preserving Signatures, by Essam Ghadafi[ expand ]
18:17 [Pub][ePrint]More Efficient Secure Outsourcing Methods for Bilinear Maps, by Öznur Arabacı and. Mehmet Sabir Kiraz and. İsa Sertkaya and. Osmanbey Uzunkol[ expand ]
14:16 [Job][New]University Professorship in IT-Security, Leibniz Universität Hannover[ expand ]


2015-10-03
02:12 [Job][New]code generation for secure embedded devices, CEA Grenoble, France[ expand ]


2015-10-02
18:17 [Pub][ePrint]Cryptanalysis of the Round-Reduced Kupyna Hash Function, by Jian Zou, Le Dong[ expand ]
18:17 [Pub][ePrint]One-key Double-Sum MAC with Beyond-Birthday Security, by Nilanjan Datta and Avijit Dutta and Mridul Nandi and Goutam Paul and Liting Zhang[ expand ]
18:17 [Pub][ePrint]Delegating RAM Computations, by Yael Tauman Kalai and Omer Paneth[ expand ]
12:33 [Job][New]Ph.D. student, Technische Universität Darmstadt, Germany[ expand ]
12:31 [Job][New]PostDoc, Eindhoven University of Technology[ expand ]


2015-10-01
21:17 [Pub][ePrint]Analysis of the Kupyna-256 Hash Function, by Christoph Dobraunig and Maria Eichlseder and Florian Mendel[ expand ]
12:11 [Job][New]PhD Student , Universitat Pompeu Fabra, Barcelona[ expand ]
09:17 [Pub][ePrint]On the Power of Pair Encodings: Frameworks for Predicate Cryptographic Primitives, by Mridul Nandi and Tapas Pandit[ expand ]
09:17 [Pub][ePrint]Online-Offline Homomorphic Signatures for Polynomial Functions, by Kaoutar Elkhiyaoui and Melek \\\"Onen and Refik Molva[ expand ]
09:17 [Pub][ePrint]Gaussian Sampling Precision and Timing Attacks in Lattice Cryptography, by Markku-Juhani O. Saarinen[ expand ]
09:17 [Pub][ePrint]Commitment and Oblivious Transfer in the Bounded Storage Model with Errors, by Rafael Dowsley and Felipe Lacerda and Anderson C. A. Nascimento[ expand ]



2015-09-30
14:16 [Job][New]PhD student, University of Luxembourg, Luxembourg City, Luxembourg[ expand ]
14:03 [PhD][Update]Saqib A. Kakvi: On the Improvement of Security Proofs: Bridging the Gap between Theory and Practice[ expand ]
12:17 [Pub][ePrint]Nearly Optimal Robust Secret Sharing, by Mahdi Cheraghchi[ expand ]
12:17 [Pub][ePrint]A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer, by Shota Goto and Junji Shikata[ expand ]
12:17 [Pub][ePrint]Private Processing of Outsourced Network Functions: Feasibility and Constructions, by Luca Melis and Hassan Jameel Asghar and Emiliano De Cristofano and Mohamed Ali Kaafar[ expand ]


2015-09-28
21:17 [Pub][ePrint]A Provably Secure Short Signature Scheme from Coding Theory, by Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref[ expand ]
21:17 [Pub][ePrint]Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp, by Yi-Ruei Chen, Shiuan-Tzuo Shen, Wen-Guey Tzeng[ expand ]
21:17 [Pub][ePrint]Asymmetric proof-of-work based on the Generalized Birthday problem, by Alex Biryukov and Dmitry Khovratovich[ expand ]
21:17 [Pub][ePrint]Secure Set-based Policy Checking and Its Application to Password Registration, by Changyu Dong and Franziskus Kiefer[ expand ]
21:17 [Pub][ePrint]New Complexity Trade-Offs for the (Multiple) Number Field Sieve Algorithm in Non-Prime Fields, by Palash Sarkar and Shashank Singh[ expand ]
21:17 [Pub][ePrint]Sandy2x: New Curve25519 Speed Records, by Tung Chou[ expand ]
21:17 [Pub][ePrint]Secrecy and independence for election schemes, by Ben Smyth[ expand ]
21:17 [Pub][ePrint]Cryptanalysis of the New Multilinear Map over the Integers, by Brice Minaud and Pierre-Alain Fouque[ expand ]
21:17 [Pub][ePrint]Secure Association for the Internet of Things, by Almog Benin and Sivan Toledo and Eran Tromer[ expand ]
21:17 [Pub][ePrint]A Decade of Lattice Cryptography, by Chris Peikert[ expand ]
21:17 [Pub][ePrint]Lattice Based Cryptography for Beginners, by Dong Pyo Chi and Jeong Woon Choi and Jeong San Kim and Taewan Kim[ expand ]
18:17 [Pub][ePrint]End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol, by Aydin Aysu and Ege Gulcan and Daisuke Moriyama and Patrick Schaumont and Moti Yung[ expand ]
18:17 [Pub][ePrint]A Privacy Preserving Improvement for SRTA in Telecare Medicine Information System, by Seyed salman Sajjadi GhaemMaghami, Mahtab Mirmohseni, Afrooz Haghbin[ expand ]
18:17 [Pub][ePrint]Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks, by C\\\'e[ expand ]
14:04 [Job][New]Post-doc in Information Assurance, University of Luxembourg, APSIA Group[ expand ]


2015-09-27
13:06 [Job][Update]Full Time Lecturer in Information Technology, University of Washington Tacoma[ expand ]
13:06 [Job][Update]Assistant Professor in Information Technology, University of Washington Tacoma[ expand ]
13:05 [Job][New]Lecturer in Computer Science and Systems, University of Washington Tacoma[ expand ]
13:04 [Job][New]Assistant Professor in Computer Science and Systems, University of Washington Tacoma[ expand ]
12:17 [Pub][ePrint]Cryptanalysis of the New CLT Multilinear Maps, by Jung Hee Cheon and Changmin Lee and Hansol Ryu[ expand ]
12:17 [Pub][ePrint]Cryptanalysis of Provably Secure Certicateless Short Signature Scheme, by Jayaprakash Kar[ expand ]
12:17 [Pub][ePrint]Using Tweaks To Design Fault Resistant Ciphers, by Sikhar Patranabis and Debapriya Basu Roy and Debdeep Mukhopadhyay[ expand ]
12:17 [Pub][ePrint]Fast and Secure Three-party Computation: The Garbled Circuit Approach, by Payman Mohassel and Mike Rosulek and Ye Zhang[ expand ]
12:17 [Pub][ePrint]Nearly Sparse Linear Algebra, by Antoine Joux and Cécile Pierrot[ expand ]
12:17 [Pub][ePrint]Are you The One to Share? Secret Transfer with Access Structure, by Yongjun Zhao and Sherman S.M. Chow[ expand ]
12:17 [Pub][ePrint]HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network, by Hassan Noura and Damien Couroussé[ expand ]


2015-09-26
18:17 [Pub][ePrint]Rich Queries on Encrypted Data: Beyond Exact Matches, by Sky Faber and Stanislaw Jarecki and Hugo Krawczyk and Quan Nguyen and Marcel Rosu and Michael Steiner[ expand ]



2015-09-25
09:17 [Pub][ePrint]CRITERION OF MAXIMAL PERIOD OF A TRINOMIAL OVER NONTRIVIAL GALOIS RING OF ODD CHARACTERISTIC, by Vadim N.Tsypyschev and Julia S.Vinogradova[ expand ]
06:57 [Job][New]Full Time Lecturer, University of Washington Tacoma[ expand ]
06:55 [Job][New]Assistant Professor, University of Washington Tacoma[ expand ]


2015-09-24
08:18 [Job][New]Post-Doc in Cryptocurrency, University of Alabama at Birmingham[ expand ]


2015-09-23
09:26 [Job][New]Research Scientists/Senior Research Scientists, Nanyang Technological University[ expand ]
09:26 [Job][New]Ph.D. students, Ruhr University Bochum[ expand ]
09:26 [Job][New]Post-doc position available, New Jersey Institute of Technology (NJIT), metro New York City, USA[ expand ]
09:25 [Job][New]Assistant Professors in Cybersecurity and/or Data Privacy, Department of Computer Science at the University of California, Santa Cruz[ expand ]
09:25 [Job][New]Post-doctoral researcher in Cryptography, Chalmers University of Technology, Sweden[ expand ]


2015-09-22
21:17 [Pub][ePrint]Exploiting the Order of Multiplier Operands: A Low Cost Approach for HCCA Resistance, by Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay[ expand ]
21:17 [Pub][ePrint]Masking Large Keys in Hardware: A Masked Implementation of McEliece, by Cong Chen and Thomas Eisenbarth and Ingo von Maurich and Rainer Steinwandt[ expand ]
21:17 [Pub][ePrint]DYNAMIC KEY-AGGREGATE CRYPTOSYSTEM ON ELLIPTIC CURVES FOR ONLINE DATA SHARING, by Sikhar Patranabis and Yash Shrivastava and Debdeep Mukhopadhyay[ expand ]
21:17 [Pub][ePrint]Localised Multisecret Sharing, by Thalia M. Laing and Keith M. Martin and Maura B. Paterson and Douglas R. Stinson[ expand ]
21:17 [Pub][ePrint]Identity-Based Revocation from Subset Difference Methods under Simple Assumptions, by Kwangsu Lee and Jong Hwan Park[ expand ]
21:17 [Pub][ePrint]Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage, by Giuseppe Ateniese and Antonio Faonio and Seny Kamara[ expand ]
21:17 [Pub][ePrint]Privacy-Preserving Data Management for Outsourced Databases, by Hung Dang and Anh Dinh and Ee-Chien Chang and Beng Chin Ooi and Shruti Tople and Prateek Saxena[ expand ]
21:17 [Pub][ePrint]Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN, by Md Iftekhar Salam and Kenneth Koon-Ho Wong and Harry Bartlett and Leonie Simpson and Ed Dawson and Josef Pieprzyk[ expand ]
21:17 [Pub][ePrint]Private Proximity Testing on Steroids: An NTRU-based Protocol, by Constantinos Patsakis and Panayiotis Kotzanikolaou and M ́elanie Bouroche[ expand ]
21:17 [Pub][ePrint]Rigorous Upper Bounds on Data Complexities of Block Cipher Cryptanalysis, by Subhabrata Samajder and Palash Sarkar[ expand ]
21:17 [Pub][ePrint]A Generic Construction for Verifiable Attribute-based Keyword Search Schemes, by Mohammmad Hassan Ameri, Maryam Rajabzadeh Assar, Javad Mohajeri, Mahmoud Salmasizadeh[ expand ]
21:17 [Pub][ePrint]A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates, by Benjamin Dowling and Marc Fischlin and Felix Günther and Douglas Stebila[ expand ]
21:17 [Pub][ePrint]Functional Signcryption: Notion, Construction, and Applications, by Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay[ expand ]
21:17 [Pub][ePrint]Extraction of intrinsic structure for Hardware Trojan detection, by Maxime Lecomte and Jacques Fournier and Philippe Maurine[ expand ]
21:17 [Pub][ePrint]Security Evaluation on Simeck against Zero Correlation Linear Cryptanalysis, by Kai Zhang, Jie Guan, Bin Hu, Dongdai Lin, Wentao Zhang[ expand ]



2015-09-21
16:07 [News]IACR news update September 2015[ expand ]


2015-09-20
12:46 [Job][New]PhD Student in Cryptography - Fully funded, Chalmers University of Technology, Sweden[ expand ]
12:42 [Job][New]Post-Doc, Crypto.Sec Group - National and Kapodistrian University of Athens, Greece[ expand ]
12:39 [Job][New]Research Associate (Post-Doc), University College London[ expand ]


2015-09-17
15:17 [Pub][ePrint]QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions, by Alonso González and Alejandro Hevia and Carla Ràfols[ expand ]
15:17 [Pub][ePrint]On the Impact of Known-Key Attacks on Hash Functions, by Bart Mennink, Bart Preneel[ expand ]
15:17 [Pub][ePrint]Linear Distinguishers in the Key-less Setting: Application to PRESENT, by Martin M. Lauridsen and Christian Rechberger[ expand ]
15:17 [Pub][ePrint]Cryptographic Assumptions: A Position Paper, by Shafi Goldwasser and Yael Tauman Kalai[ expand ]
15:17 [Pub][ePrint]RoadRunneR: A Small And Fast Bitslice Block Cipher For Low Cost 8-bit Processors, by Adnan Baysal and Suhap Sahin[ expand ]
15:17 [Pub][ePrint]Mapping the Intel Last-Level Cache, by Yuval Yarom and Qian Ge and Fangfei Liu and Ruby B. Lee and Gernot Heiser[ expand ]
15:17 [Pub][ePrint]Almost-tight Identity Based Encryption against Selective Opening Attack, by Junqing Gong and Xiaolei Dong and Zhenfu Cao and Jie Chen[ expand ]
15:17 [Pub][ePrint]A Note on the Indifferentiability of the 10-Round Feistel Construction, by Yannick Seurin[ expand ]
15:17 [Pub][ePrint]Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques, by Kexin Qiao and Lei Hu and Siwei Sun[ expand ]
04:36 [Event][New]CBCW'15: Code Based Crypto Workshop 2015[ expand ]
04:35 [Event][New]AsiaPKC 2016: The 3rd ACM ASIA Public-Key Cryptography Workshop[ expand ]


2015-09-16
15:17 [Pub][ePrint]A Unified Approach to MPC with Preprocessing using OT, by Tore Kasper Frederiksen and Marcel Keller and Emmanuela Orsini and Peter Scholl[ expand ]
15:17 [Pub][ePrint]New Results on Identity-based Encryption from Quadratic Residuosity, by Ferucio Laurentiu Tiplea and Emil Simion[ expand ]
15:17 [Pub][ePrint]Privacy-preserving Attribute Based Searchable Encryption, by Payal Chaudhari and Maniklal Das[ expand ]
15:17 [Pub][ePrint]Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud, by Mehmet Sinan Inci and Berk Gulmezoglu and Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar[ expand ]
01:35 [Event][New]ICITS 2016: 9th International Conference on Information Theoretic Security[ expand ]



2015-09-15
09:17 [Pub][ePrint]Integrity-Aware Parallelizable Cipher Feedback Mode for Real-time Cryptography, by Prosanta Gope[ expand ]
09:17 [Pub][ePrint]Improved Attacks on Reduced-Round Camellia-128/192/256, by Xiaoyang Dong and Leibo Li and Keting Jia and Xiaoyun Wang[ expand ]
09:17 [Pub][ePrint]Rogue Decryption Failures: Reconciling AE Robustness Notions, by Guy Barwell and Dan Page and Martijn Stam[ expand ]
09:17 [Pub][ePrint]Comparison of cube attacks over different vector spaces, by Richard Winter and Ana Salagean and Raphael C.-W. Phan[ expand ]
09:17 [Pub][ePrint]Robust Authenticated Encryption and the Limits of Symmetric Cryptography, by Christian Badertscher and Christian Matt and Ueli Maurer and Phillip Rogaway and Björn Tackmann[ expand ]
09:17 [Pub][ePrint]Security Against Related Randomness Attacks via Reconstructive Extractors, by Kenneth G. Paterson and Jacob C. N. Schuldt and Dale L. Sibborn and Hoeteck Wee[ expand ]
09:17 [Pub][ePrint]Private Ciphertext-Policy Attribute-based Encryption Schemes With Constant-Size Ciphertext Supporting CNF Access Policy, by S\\\'ebastien Canard and Viet Cuong Trinh[ expand ]
09:17 [Pub][ePrint]MI-T-HFE, a New Multivariate Signature Scheme, by Wenbin Zhang and Chik How Tan[ expand ]


2015-09-14
09:17 [Pub][ePrint]Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?, by Ana Maria Costache and Nigel P. Smart[ expand ]
09:17 [Pub][ePrint]Tweak-Length Extension for Tweakable Blockciphers, by Kazuhiko Minematsu and Tetsu Iwata[ expand ]


2015-09-13
21:17 [Pub][ePrint]Round-Optimal Token-Based Secure Computation, by Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam[ expand ]
21:17 [Pub][ePrint]Applying Cryptographic Acceleration Techniques to Error Correction, by R\\\'emi G\\\'eraud and Diana-Stefania Maimut and David Naccache and Rodrigo Portella do Canto and Emil Simion[ expand ]
21:17 [Pub][ePrint]A New Standard of Ukraine: The Kupyna Hash Function, by Roman Oliynykov and Ivan Gorbenko and Oleksandr Kazymyrov and Victor Ruzhentsev and Oleksandr Kuznetsov and Yurii Gorbenko and Artem Boiko and O[ expand ]
21:17 [Pub][ePrint]General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps, by Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay[ expand ]
21:17 [Pub][ePrint]Revisiting Sum of CBC-MACs and Extending NI2-MAC to Achieve Beyond-Birthday Security, by Avijit Dutta and Goutam Paul[ expand ]
21:17 [Pub][ePrint]A Generic Countermeasure Against Fault Injection Attacks on Asymmetric Cryptography, by Pablo Rauzy and Martin Moreau and Sylvain Guilley and Zakaria Najm[ expand ]
21:17 [Pub][ePrint]Generic Security of NMAC and HMAC with Input Whitening, by Peter Gazi and Krzysztof Pietrzak and Stefano Tessaro[ expand ]
21:17 [Pub][ePrint]Generic Efficient Dynamic Proofs of Retrievability, by Mohammad Etemad and Alptekin Küpçü[ expand ]
21:17 [Pub][ePrint]Computing information on domain parameters from public keys selected uniformly at random, by Martin Ekerå[ expand ]
21:17 [Pub][ePrint]Making Existential-Unforgeable Signatures Strongly Unforgeable in the Quantum Random-Oracle Model, by Edward Eaton and Fang Song[ expand ]
21:17 [Pub][ePrint]Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule, by Christophe Clavier and Julien Francq and Antoine Wurcker[ expand ]
21:17 [Pub][ePrint]10-Round Feistel is Indifferentiable from an Ideal Cipher, by Dana Dachman-Soled and Jonathan Katz and Aishwarya Thiruvengadam[ expand ]
21:17 [Pub][ePrint]Bent and Semi-bent Functions via Linear Translators, by Ne\\c{s}e Ko\\c{c}ak, Sihem Mesnager and Ferruh \\\"{O}zbudak[ expand ]
21:17 [Pub][ePrint]Feistel Networks: Indifferentiability at 10 Rounds, by Yuanxi Dai and John Steinberger[ expand ]
21:17 [Pub][ePrint]On the Diffusion property of iterated functions, by J. Liu, S. Mesnager, and L. Chen[ expand ]
21:17 [Pub][ePrint]Traceability Improvements of a New RFID Protocol Based On EPC C1G2, by Seyed Slman Sajjadi GhaemMaghami, Afrooz Haghbin, Mahtab Mimohseni[ expand ]
21:17 [Pub][ePrint]A Complete and Linear Physical Characterization Methodology for the Arbiter PUF Family, by Shahin Tajik and Enrico Dietz and Sven Frohmann and Helmar Dittrich and Dmitry Nedospasov and Clemens Helfmei[ expand ]
12:43 [Job][New]PhD Position, COSIC - KU Leuven[ expand ]


2015-09-12
01:14 [Job][New]Senior Security Engineer, IOT Business Unit, ARM Ltd[ expand ]



2015-09-10
23:17 [Event][New]6th BIU Winter School: Crypto in the Cloud – Verifiable Comp. & Special Enc[ expand ]
23:16 [Job][New]Assistant/Associate/Full Professor, Northern Arizona University[ expand ]
23:14 [Job][New]PhD student fully funded, Chalmers University of Technology, Sweden [ expand ]
04:32 [Job][New]Postdoctoral Position in Post Quantum Cryptography, KAIST – Daejeon, Korea[ expand ]


2015-09-08
12:43 [Job][Update]Symphony.com Ethical Hacker / Security Penetration Tester, Symphony.com[ expand ]
12:42 [Job][Update]Head of Security Product Management, Symphony.com[ expand ]
09:17 [Forum][2014 Reports] 2014/946 by SBouftass[ expand ]
06:17 [Pub][ePrint]Gambling, Computational Information and Encryption Security, by Mohammad Hajiabadi and Bruce M. Kapron[ expand ]
06:17 [Pub][ePrint]New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators, by Tatsuaki Okamoto and Krzysztof Pietrzak and Brent Waters and Daniel Wichs[ expand ]
06:17 [Pub][ePrint]Optimally Secure Block Ciphers from Ideal Primitives, by Stefano Tessaro[ expand ]
06:17 [Pub][ePrint]Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security, by Michel Abdalla and Fabrice Benhamouda and Alain Passelègue[ expand ]
06:17 [Pub][ePrint]Graded Encoding, Variations on a Scheme, by Shai Halevi[ expand ]
06:17 [Pub][ePrint]Card-based Cryptographic Protocols Using a Minimal Number of Cards, by Alexander Koch and Stefan Walzer and Kevin Härtel[ expand ]
06:17 [Pub][ePrint]Encryption Performance Improvements of the Paillier Cryptosystem, by Christine Jost and Ha Lam and Alexander Maximov and Ben Smeets[ expand ]
06:17 [Pub][ePrint]Is There an Oblivious RAM Lower Bound?, by Elette Boyle and Moni Naor[ expand ]
06:17 [Pub][ePrint]Idealizing Identity-Based Encryption, by Dennis Hofheinz and Christian Matt and Ueli Maurer[ expand ]


2015-09-07
09:37 [Event][New]DIAC 2015: Directions in Authenticated Ciphers 2015[ expand ]
00:17 [Pub][ePrint]A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers, by Chun Guo and Dongdai Lin[ expand ]
00:17 [Pub][ePrint]Selective Opening Security for Receivers, by Carmit Hazay and Arpita Patra and Bogdan Warinschi[ expand ]
00:17 [Pub][ePrint]Factor Base Discrete Logarithms in Kummer Extensions, by Dianyan Xiao and Jincheng Zhuang and Qi Cheng[ expand ]
00:17 [Pub][ePrint]Group Signatures Without q-Assumptions, by Olivier Blazy and Saqib A. Kakvi[ expand ]
00:17 [Pub][ePrint]Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy, by Benjamin Fuller and Ariel Hamlin[ expand ]
00:17 [Pub][ePrint]MGR HASH FUNCTION, by Khushboo Bussi and Dhananjoy Dey and P. R. Mishra and B.K. Dass[ expand ]
00:17 [Pub][ePrint]A new framework for keystream generators against Correlation, Linear and Distinguishing Attacks, by GANESH YELLAPU[ expand ]
00:17 [Pub][ePrint]Secure Sketch Metamorphosis: Tight Unified Bounds, by Jeroen Delvaux and Dawu Gu and Ingrid Verbauwhede and Matthias Hiller and Meng-Day (Mandel) Yu[ expand ]
00:17 [Pub][ePrint]Standard Security Does Imply Security Against Selective Opening for Markov Distributions, by Felix Heuer and Eike Kiltz and Krzysztof Pietrzak[ expand ]


2015-09-06
08:47 [Job][New]Postdoctoral Position in Cybersecurity, Fordham University, NY[ expand ]
08:47 [Job][New]PhD student , Chalmers University of Technology, Sweden [ expand ]
08:47 [Job][New]Ph.D. student, fully funded (CIFRE) positions, Huawei Technologies, Paris[ expand ]



2015-09-03
09:17 [Pub][ePrint]Analysis of a key exchange protocol based on tropical matrix algebra, by Matvei Kotov and Alexander Ushakov[ expand ]
00:50 [Job][New]Ph.D. student, Post-Doc, Software Engineer, IBM Research - Zurich[ expand ]


2015-09-02
15:17 [Pub][ePrint]Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing, by Benoît Cogliati and Yannick Seurin[ expand ]
15:17 [Pub][ePrint]Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable, by Zhen Liu and Duncan S. Wong[ expand ]
15:17 [Pub][ePrint]Regulating the Pace of von Neumann Correctors, by Houda Ferradi, R\\\'emi G\\\'eraud, Diana Maimu\\c{t}, David Naccache, and Amaury de Wargny[ expand ]
15:17 [Pub][ePrint]The Multiplicative Complexity of Boolean Functions on Four and Five Variables, by Meltem Sonmez Turan and Rene Peralta[ expand ]
15:17 [Pub][ePrint]Exploring Energy Efficiency of Lightweight Block Ciphers, by Subhadeep Banik and Andrey Bogdanov and Francesco Regazzoni[ expand ]
15:17 [Pub][ePrint]Characterization of Secure Multiparty Computation Without Broadcast, by Ran Cohen and Iftach Haitner and Eran Omri and Lior Rotem[ expand ]


2015-09-01
19:19 [Event][New]ASK 2015: Asian Workshop on Symmetric Key Cryptography 2015 (School)[ expand ]
09:17 [Pub][ePrint]Cryptanalysis of the Quadratic Zero-Testing of GGH, by Zvika Brakerski and Craig Gentry and Shai Halevi and Tancrède Lepoint and Amit Sahai and Mehdi Tibouchi[ expand ]


2015-08-31
18:17 [Pub][ePrint]Related-key Impossible Differential Analysis of Full Khudra, by Qianqian Yang and Lei Hu and Siwei Sun and Ling Song[ expand ]
18:17 [Pub][ePrint]Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really?, by David Wong[ expand ]
18:17 [Pub][ePrint]Offline Witness Encryption, by Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak[ expand ]
18:17 [Pub][ePrint]Multi-Variate High-Order Attacks of Shuffled Tables Recomputation, by Nicolas BRUNEAU and Sylvain GUILLEY and Zakaria NAJM and Yannick TEGLIA[ expand ]
18:17 [Pub][ePrint]DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation --- Preliminary Report, by Jeff Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte[ expand ]
18:17 [Pub][ePrint]Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes, by David Derler and Daniel Slamanig[ expand ]
18:17 [Pub][ePrint]On Linkability and Malleability in Self-blindable Credentials, by Jaap-Henk Hoepman and Wouter Lueks and Sietse Ringers[ expand ]
18:17 [Pub][ePrint]An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices, by Vanga Odelu and Ashok Kumar Das and Adrijit Goswami[ expand ]



2015-08-29
08:51 [Job][New]Research Scientists on Cyber-Physical Security, Institute for Infocomm Research, Singapore[ expand ]


2015-08-28
21:17 [Pub][ePrint]On near prime-order elliptic curves with small embedding degrees, by Duc-Phong Le and Nadia El Mrabet and Chik How Tan[ expand ]
21:17 [Pub][ePrint]Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys, by Benjamin Wesolowski and Pascal Junod[ expand ]
18:17 [Pub][ePrint]Authentication Using Side-Channel Information, by Kazuo Sakiyama and Takanori Machida and Arisa Matsubara and Yunfeng Kuai and Yu-ichi Hayashi and Takaaki Mizuki and Noriyuki Miura and Makoto Nagata[ expand ]
18:17 [Pub][ePrint]Efficient Key Authentication Service for Secure End-to-end Communications, by Mohammad Etemad and Alptekin Küpçü[ expand ]
18:17 [Pub][ePrint]Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices, by David McCann, Kerstin Eder, Elisabeth Oswald[ expand ]
01:37 [Event][New]WISE 2015: Workshop on Implementation: Security and Evaluation[ expand ]


2015-08-26
18:17 [Pub][ePrint]M-MAP: Multi-Factor Memory Authentication for Secure Embedded Processors, by Syed Kamran Haider and Masab Ahmad and Farrukh Hijaz and Astha Patni and Ethan Johnson and Matthew Seita and Omer Khan and [ expand ]
18:17 [Pub][ePrint]Unique Signature with Short Output from CDH Assumption, by Shiuan-Tzuo Shen and Amir Rezapour and Wen-Guey Tzeng[ expand ]
18:17 [Pub][ePrint]Reducing Multilinear Map Levels in Constrained PRFs and ABE, by Nishanth Chandran and Srinivasan Raghuraman and Dhinakaran Vinayagamurthy[ expand ]
15:17 [Pub][ePrint]State-recovery analysis of Spritz, by Ralph Ankele and Stefan Koelbl and Christian Rechberger[ expand ]
15:17 [Pub][ePrint]Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation, by Geumsook Ryu and Kwangsu Lee and Seunghwan Park and Dong Hoon Lee[ expand ]
15:17 [Pub][ePrint]Programmable Hash Functions go Private:Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys, by Dario Catalano and Dario Fiore and Luca Nizzardo[ expand ]


2015-08-24
21:17 [Pub][ePrint]The Emperor\'s New Password Creation Policies, by Ding Wang and Ping Wang[ expand ]
15:17 [Pub][ePrint]Efficient Fully Structure-Preserving Signatures for Large Messages, by Jens Groth[ expand ]